
Do you trust your cyber security supply chain?
Creating a Secure Cyber Security Supply Chain
We all know the…
October 28, 2020/by Brad ThomasWe all know the…

Creating the Ideal Cybersecurity Blueprint: Why Log Management Is Critical in Preventing Major Fines and Long-Term Security Issues
Creating the Ideal Cybersecurity Plan
When it comes to creating…
October 22, 2020/by Brad ThomasWhen it comes to creating…

Cyber risks: What do you tell the board?
Cyber security risks: What do you tell the board?
Cyber security…
October 2, 2020/by Brad ThomasCyber security…

Snare on Sky News!
In case you missed it, and you'd have to be watching Sky News…
May 27, 2017/by Chris Conley
The 5 Event & Log Collection Musts
Security Information and Event Management, or SIEM, is worthless…
May 23, 2017/by Chris Conley
Tying Windows Events and Syslogs Together
In typical Microsoft fashion they had to go and create their…
February 1, 2017/by ProphecyProducts
Recent Posts
- The Cyber Volume Crisis: Why Modern Security Teams Are Drowning in Data — and What to Do About It
- Snare’s ISO 27001 Certification & Commitment to Cyber Security Continues in 2025
- Visibility Starts at the Source: How Snare Agent v5.10 Standardises Global Security Operations
- Cyber Resilience: When “Detect & Recover” Beats “Prevent & Protect”
- How the Cyber 4Cs Help Security Leaders Build a Resilient Logging Strategy
- Smarter Event Logging for a Resilient Future


